You can simulate this for a specific TCP port on Linux (with or without something listening on that port) using iptables and a DROP target. The DROP results in a complete lack of response, and triggers the "filtered" result in nmap.

Compare this with a "closed" port which would result in an RST being sent, or a port which you may have configured with an ICMP "administratively prohibited" or similar message.